Articles about Security

If you're going to San Francisco be sure to travel free with ransomware

Ransomware

The Muni public transport system in San Francisco has been hit by a major ransomware attack over the weekend that left the network having to give passengers free travel.

It's estimated that around 2,000 systems have been affected by the attack, which began on Friday, including ticket machines, servers and Windows workstations.

Continue reading

One in four Wi-Fi hotspots is a security nightmare

Public wi-fi

A quarter of the world's Wi-Fi networks are so insecure that the only thing stopping hackers from abusing them is their own lack of will. This is according to a new, extensive research by security experts at Kaspersky Lab, which have analyzed more than 31 million public Wi-Fi hotspots all over the world.

Basically, 25 percent aren’t using any type of encryption or password protection, meaning the information going through these networks is wide open for everyone to see. Another three percent are using WEP, which is a protocol that can be cracked "within minutes, using tools that are freely available on the internet".

Continue reading

The lure of keygens helps spread Gatak malware through the enterprise and healthcare industry

malware-alert

Malware spreads through various channels, and numerous methods are used to fool people into unwittingly installing it. In many cases, the promise of getting something for free -- naming expensive software -- is enough to trick a victim into infecting their own computer.

It's far from being a new tactic, and warnings have been issued to fans of torrenting for some time. Keygens (small programs that promise to provide unlock codes and product keys for big-name software titles) are being used to help spread the Gatak or Stegoloader Trojan. Something that is interesting about this malware campaign is that it is specifically targeting enterprise users, with a particular focus on the healthcare industry.

Continue reading

Many users don't want to deal with breached businesses

Nope

We get plenty of reports on people being asked if they'd continue doing business with organizations that got breached. Sometimes, the reports are positive, saying people understand all the hard work organizations put into securing their data and that, sometimes, breaches can happen.

On other days, these reports claim people would walk away from such companies, never to look in their direction again. Today is one of those days. A new report by The Internet Society, called 2016 Global Internet Report, says 40 percent of users would not do business with a company that suffered a data breach.

Continue reading

North American businesses suffer twice as many cyber attacks

Exclusive: Widespread security flaw affects hundreds of UK news sites

A new report from Kaspersky Lab finds that businesses in North America are significantly less protected against cyberattacks compared to those worldwide.

According to the study 20 percent of global enterprises suffered four or more data breaches in the past year, while 44 percent of North American businesses suffered a similar number of attacks.

Continue reading

Police warn about dating apps after serial killer conviction

grindr-iphone

Police are warning people who use dating sites and dating apps to take extra precautions to ensure their safety. The advice comes after serial killer Stephen Port who contacted his victims through apps such as Grindr and Gaydar.

While people making use of dating services have always been warned to take safety precautions, police are concerned that sexual predators are increasingly using such sites and apps as a way of finding potential victims.

Continue reading

UK bank will let customers withdraw cash using their smartphone

Cash UK British pound sterling

UK bank Barclays is testing a new feature for cash withdrawals which should eliminate skimming at ATM machines, the BBC reports. The idea is similar to contactless and mobile payment systems -- you wave your smartphone close to an ATM machine and, when prompted, type in your PIN code in either the smartphone or the ATM.

The bank says that way it will make it much harder to hijack card details. The new feature is being tested for Android-powered devices only, with iPhones being out of the picture. Apple has limited the use of iPhone NFC chips to their own Apple Pay technology, making it impossible for Barclays to use the device. However, those that don't have an Android phone will be able to use an NFC-enabled card.

Continue reading

Kaspersky: DDoS attacks are a smokescreen

DDoS keyboard

Distributed denial of service (DDoS) attacks make a lot of noise, and according to a new Kaspersky Lab report, that’s exactly what hackers are using them for.

As businesses are preoccupied with handling DDoS attacks, hackers use the opportunity for another, more targeted, and more deadly type of attack. Basically, DDoS is nothing more than a smokescreen. The conclusion comes in Kaspersky Lab’s report, which polled businesses about their cybersecurity experiences. More than half (56 percent) say DDoS is being used to cover something else.

Continue reading

Hewlett Packard Enterprise laptop hack exposes personal details of 130,000 US Navy sailors

us-navy-ship-flag

A data breach has exposed the personal details of more than 130,000 US Navy sailors, including social security numbers.

Rather than being a breach of the Navy's own defences, the data leak came about after a laptop owned by a Hewlett Packard Enterprise employee was compromised. In total, 134,386 current and former sailors are affected by the problem.

Continue reading

Microsoft shares Windows 10 telemetry data with third parties [Updated]

Eye spy

It’s no secret that Windows 10 records all sorts of usage information, some of which it feeds back to Microsoft. To help with the smooth running of Windows 10, and to get an idea of how users interact with the operating system, Microsoft collects telemetry data, which includes information on the device Windows 10 is running on, a list of installed apps, crash dumps, and more.

Telemetry data recorded by Windows 10 is, in a nutshell, just technical information about the device the OS is on, and how Windows and any installed software is performing, but it can occasionally include personal information. If you’re worried about that, the news that Microsoft is sharing telemetry data with third parties might concern you.

Continue reading

CERT warning: Windows 10 is less secure than Windows 7 with EMET

computer-security-chain-padlock

In direct contrast to Microsoft's assertion that Windows 10 is its most secure operating system ever, the US-CERT Coordination Center says that Windows 7 with EMET offers greater protection. With EMET due to be killed off, security experts are concerned.

A vulnerability analyst from CERT, Will Dormann, advises Microsoft to continue the development of EMET. Microsoft says 'many' of EMET's features have been integrated into Windows 10, but the concern is that key components are missing, and others have been implemented in such a way that reduces their security.

Continue reading

11 rules to improve mobile security

Smartphone closeup

Mobile devices have inundated our lives. Smartphones, tablets, phablets, wearables, the list of mobiles and their variants is endless. People have stopped talking and started dat(a)ing in a big way. Communication through smart devices has clearly overwhelmed us like never before. People are buying, paying and living through their mobiles. Love and relationships can be activated through a single app.

We have reached a state where people use more than a single smart device at a time. As long as the smart-ness of smartphones was confined to individuals, the corporate world could afford to remain a silent bystander, but no longer. The BYOD or Bring Your Own Device is the new norm and not a single business can avoid the challenges which come with mobility in management.

Continue reading

How will quantum computing impact security processes?

Quantum computing

Quantum computers have the potential to perform calculations faster than ever possible before, inviting a significant rethink in how we approach cyber security.

Given the amount of research being ploughed into this area, we are likely to see a commercially viable machine in the near future, so cryptographers and the cyber security industry in general should work to have a clear view on the implications way ahead of that achievement.

Continue reading

Free tool helps consumers check online security ahead of Black Friday

Checklist

On this year's Black Friday and Cyber Monday, more Americans will be shopping online than ever before, but a new study reveals that the majority are concerned about the potential to have their personal and financial information hacked.

The survey from cybersecurity company UpGuard shows that almost 95 percent of consumers are concerned about the security of their information online, and more than half would break with their favorite brands if they knew their information was at risk.

Continue reading

OneDrive for Business accounts used to spread malware

Malware spy

Malware purveyors have been making use of cloud services for some time, sending cloud-storage links that host malware to victims is an efficient way for cyber criminals to operate.

In a new twist to the technique, Forcepoint Security Labs has discovered that cybercriminals have been utilizing compromised Microsoft OneDrive for Business accounts to host malware since at least August of this year.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.